Analysis

  • max time kernel
    141s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    08/10/2023, 13:24

General

  • Target

    942c291a8ba4d425da271e13056061a5eb251b0c0990f8b7c883df29268d6f42.exe

  • Size

    10.7MB

  • MD5

    536487b7b8bbebe4721cce7cfdd9df79

  • SHA1

    a4b450108d76108c1d6c580c6a82879f6cb8d845

  • SHA256

    942c291a8ba4d425da271e13056061a5eb251b0c0990f8b7c883df29268d6f42

  • SHA512

    bdd183db8a714514e7ac2f7c274ba793b7a9a3790471a55becd7d7566b236f17bc9abf3b8a0e85a023023d17565c360369c272c04f14152601ba0fab755ca119

  • SSDEEP

    196608:b+mMPftHATjU89DO1B1boOR5AXE4CGxNz7LlF1AFL3jrX3K2:b+meftOQ89DO10OR5p4ljLlFczjrnR

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\942c291a8ba4d425da271e13056061a5eb251b0c0990f8b7c883df29268d6f42.exe
    "C:\Users\Admin\AppData\Local\Temp\942c291a8ba4d425da271e13056061a5eb251b0c0990f8b7c883df29268d6f42.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1300
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del "C:\Users\Admin\AppData\Local\Temp\*c291a8ba4d425da271e13056061a5eb251b0c0990f8b7c883df29268d6f42.exe"
      2⤵
        PID:912
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del "C:\Users\Admin\AppData\Local\Temp\*.dll"
        2⤵
          PID:612

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              c7b7802c4638ef2c8ffd18ccf2f3861d

              SHA1

              8cf32b61fa0d83f653baf277e9fd1ec9db1589c2

              SHA256

              29628a5e249044a5618ff77c472f908e3b175866078747e5342d9ff3a61bd775

              SHA512

              8ee98780ed9add3afd5ee7ebd53dd84364b68f5e6ebd0c6d505f008c6512db5d2dc3ce7a7f832d8d9669353f81ae4923795f311e577527f168a5648f98c2736f

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XJKHGHKT\d[3].htm

              Filesize

              7B

              MD5

              cfeff27bb88c9a449a75c81cdfd2a626

              SHA1

              90731bf72ead9e3f86a6ff1d99ff5b5628e72d81

              SHA256

              e98b26196047337a19e6ef6d13f48dc5f54f6f442c23fc164dac5e03ed2208c6

              SHA512

              a3e4a729d5d3fd14cda07252f93b30926fc5968a5265c58835dad8354502ff3326ac2e2f5b0b1c7c8cc8f1fdff770e22443dab8bc1b52ff397e3206225e94a00

            • C:\Users\Admin\AppData\Local\Temp\942c291a8ba4d425da271e13056061a5eb251b0c0990f8b7c883df29268d6f42.exepack.tmp

              Filesize

              2KB

              MD5

              319f0e360eabb49a70501d40fd45b6c3

              SHA1

              818d73328c6b1b366c187e05b0d48e3e3b5af15a

              SHA256

              a064521e9577de3345484690e68d1e6f308e9c753d6c86e70ba6109000b5b282

              SHA512

              cc1cfb5008bddd8fdebba83a98e2c393d5c489d349f909b86d2cbce2d267b846fffbfd871214ded47cb110769816be4bed69576078a954d3f22f38fe72616bdf

            • C:\Users\Admin\AppData\Local\Temp\9929b4ee4f06c060343c04d0a3a01c38.ini

              Filesize

              1KB

              MD5

              ac417f5a7566a502c5b6d951392f055d

              SHA1

              3ff1e2acb53dfe341ed2ad33ab0f63308b1bf76a

              SHA256

              a8f6be72d3e04a083b407d2c3e8957a40da90f00da50ff532e7d216231f0059b

              SHA512

              5ca36e6bd016c6ebf195b6a00a9bfff165082d524b9bf18f8f91cb588b420686547cf669431f36ed609f8eff3dcd721947a65f62784e3ab7a53a9f277ae6ba8c

            • C:\Users\Admin\AppData\Local\Temp\9929b4ee4f06c060343c04d0a3a01c38A.ini

              Filesize

              1KB

              MD5

              eec471de4ba0fbb77b03c8f78fc81321

              SHA1

              a94ce87dbaff958a8a115b9952cc3681445c01b0

              SHA256

              e19ff4665e485c5ddc1105b5dc11abffa3309202a4d866dd759cc845ef7a5f87

              SHA512

              08f6ae3da56db75ef9934e7c620bfd6e0a53c90be00798bd383b598df93d19867e42a28c8e02cde22f25e12bc4591f457fb85a949ff2852c6617e19af55f8e5b

            • C:\Users\Admin\AppData\Local\Temp\CabCF60.tmp

              Filesize

              61KB

              MD5

              f3441b8572aae8801c04f3060b550443

              SHA1

              4ef0a35436125d6821831ef36c28ffaf196cda15

              SHA256

              6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

              SHA512

              5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

            • C:\Users\Admin\AppData\Local\Temp\TarD020.tmp

              Filesize

              163KB

              MD5

              9441737383d21192400eca82fda910ec

              SHA1

              725e0d606a4fc9ba44aa8ffde65bed15e65367e4

              SHA256

              bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

              SHA512

              7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

            • memory/1300-331-0x0000000000400000-0x0000000001DC0000-memory.dmp

              Filesize

              25.8MB

            • memory/1300-342-0x0000000000400000-0x0000000001DC0000-memory.dmp

              Filesize

              25.8MB

            • memory/1300-333-0x0000000050000000-0x0000000050109000-memory.dmp

              Filesize

              1.0MB

            • memory/1300-334-0x0000000000400000-0x0000000001DC0000-memory.dmp

              Filesize

              25.8MB

            • memory/1300-335-0x0000000000400000-0x0000000001DC0000-memory.dmp

              Filesize

              25.8MB

            • memory/1300-336-0x0000000000400000-0x0000000001DC0000-memory.dmp

              Filesize

              25.8MB

            • memory/1300-337-0x0000000000400000-0x0000000001DC0000-memory.dmp

              Filesize

              25.8MB

            • memory/1300-338-0x0000000000400000-0x0000000001DC0000-memory.dmp

              Filesize

              25.8MB

            • memory/1300-339-0x0000000000400000-0x0000000001DC0000-memory.dmp

              Filesize

              25.8MB

            • memory/1300-340-0x0000000000400000-0x0000000001DC0000-memory.dmp

              Filesize

              25.8MB

            • memory/1300-341-0x0000000000400000-0x0000000001DC0000-memory.dmp

              Filesize

              25.8MB

            • memory/1300-332-0x00000000001C0000-0x00000000001C3000-memory.dmp

              Filesize

              12KB

            • memory/1300-345-0x00000000038D0000-0x00000000038E0000-memory.dmp

              Filesize

              64KB

            • memory/1300-0-0x0000000000400000-0x0000000001DC0000-memory.dmp

              Filesize

              25.8MB

            • memory/1300-5-0x0000000050000000-0x0000000050109000-memory.dmp

              Filesize

              1.0MB

            • memory/1300-2-0x0000000000400000-0x0000000001DC0000-memory.dmp

              Filesize

              25.8MB

            • memory/1300-1-0x00000000001C0000-0x00000000001C3000-memory.dmp

              Filesize

              12KB

            • memory/1300-466-0x0000000000400000-0x0000000001DC0000-memory.dmp

              Filesize

              25.8MB

            • memory/1300-467-0x0000000000400000-0x0000000001DC0000-memory.dmp

              Filesize

              25.8MB

            • memory/1300-468-0x0000000000400000-0x0000000001DC0000-memory.dmp

              Filesize

              25.8MB

            • memory/1300-469-0x0000000000400000-0x0000000001DC0000-memory.dmp

              Filesize

              25.8MB